


EOMT and security updates do not replace each other but should be used together to remediate and protect messaging environments. To address them Microsoft Exchange On-Premises Mitigation Tool (EOMT) and security updates have been released. Microsoft rates these vulnerabilities as critical. Compress stolen mailbox and Active Directory data using 7-Zip for further exfiltration.Steal copies of Active Directory database.Adding and using Exchange PowerShell snap-ins to export mailbox data.Dump credentials information from LSASS process memory using Procdump.Move laterally to other systems in the network.Once an attacker exploits the above-mentioned vulnerabilities, they launch attack kill-chain by performing the following steps: Conversely, organizations which have fully migrated their mailbox workloads to Office 365 are not affected by this vulnerability. On March 2, 2021, Microsoft published a blog post about a state-sponsored threat actor called Hafnium, which has exploited these four zero-day vulnerabilities in Microsoft Exchange on-premises code and launching targeted attacks.Īll our clients running Exchange Server 2013, 20 on-premises are vulnerable to these exploits. This vulnerability exploits three more zero-day vulnerabilities and allows a threat actor to get control of an attacked network. In January 2021, Volexity detected a Server-Side Request Forgery (SSRF) vulnerability on Exchange Server 2016. It means that messaging systems are still a high-value asset for businesses and a high-value target for attackers. Email is still an important productivity tool for most organizations and isn’t going anywhere in the near future, even with Microsoft Teams becoming more widely adopted.
